Here we will configure your primary domain controller (PDC) to connect to an external source to keep your time synchronized up with the rest of the world. By changing the primary DC's time source to an external source, the changes will be replicated from the PDC to other clients in your domain; limiting the amount of bandwidth needed to synchronize with an external source. First, I am going to reference much of the information provided by Marc Weisel. I would highly recommend you check out his blog post as it contains a ton of valuable information on the subject as well as more information/best practicies in regards to keeping time in your organization's infrastrucutre: http://binarynature.blogspot.co.uk/2012/04/configure-active-directory.html
Find out what your primary domain controller (PDC) is for your domain by executing the following powershell commands from any machine in the domain
In this tutorial, we will implement one of Server 2012's newest features, DHCP Failover. Before Server 2012, DHCP failover was achieved through Windows Failover Cluster. Now, Server 2012 has native tools built into the DHCP role to support failover without the need to setup clustering services. It is nice to note that DHCP failover is fully supported in all server editions of Windows Server 2012 (Foundation, Standard, Data Center), allowing everyone to provide this role in high availability.
Before beginning, this tutorial assumes the following prerequisites to this tutorial:
Two Server 2012 servers have been installed and joined to your domain as member servers
Both servers have installed the DHCP role
One of the servers has been configured with your desired DHCP scopes
Login to your primary DHCP server that has been configured with the DHCP scopes
Open up the DHCP program
Launch Server Manager
Click Tools->DHCP
Expand your DHCP server and right click on IPv4 and select Configure Failover...
On the Introduction to DHCP Failover page, click Next to allow failover of all DHCP scopes. Optionally, uncheck Select all and select the specific scopes you would like to allow to failover and then click Next.
Click on the Add Server button
Check This authorized DHCP server, select the server you would like to use to allow failover, and then click OK
Click Next
Enter in the settings you wish to use and then click Next. I would recommend entering a Shared Secret and checking the State Switchover Interval to failover in the event a server fails unexpectedly. Notes:
If you are failing over to another DHCP server on the same subnet, it is recommended to setup loadbalancing. If you are failing over your DHCP server to another network, set the mode to Hot standby. Additionally, here is a list with more indepth details on what each option does.
Relationship Name: Descriptive name to describe this DHCP Failover relationship. This can be named anything to help you understand the server relationship.
Maximum Client Lead Time: Specifies the amount of time for which a DHCP lease may be renewed by either failover peer without contacting the other. It also specifies the amount of time that either DHCP server will wait in a “partner down” state before assuming control of the entire IP address range within the scope. ( default = 1 hour ).
Mode: Select Load Balance ( default – Active / Active ) or Hot Standby ( Active / Passive )
Load Balance Percentage: Specifies the percentage of the IP Address range to reserve for each server in the failover relationship. Each server will use their assigned range of addresses prior to assuming control over the entire IP Address range of a scope when the other server transitions into a “partner down” state and the Maximum Client Lead Time ( specified above ) passes.
Auto State Switchover Interval: When selected, specifies the amount of time that elapses before a DHCP Server is automatically transitioned to a “partner down” state when network communication is interrupted to a DHCP Server. If this option is unchecked, an administrator must manually transition the status of a DHCP Server into a “partner down” state using the DHCP Management console or PowerShell. ( when checked, the default = 60 minutes )
Enable Message Authentication: check this checkbox option to enable authentication of failover replication traffic between servers
Shared Secret: Type a “Shared Secret” ( ie., a Password ) to be used to authenticate the failover connection between servers
Click Finish
Click Close on the results dialog, confirming the failover configuration was properly setup.
Optionally, you can login to your secondary DHCP server to confirm failover has successfully been setup.
On the secondary DHCP server, right click on one of your DHCP scopes and select Properties
Select the Failover tab and you should see your failover settings in effect.
That's all that's to it! Hurray for high availability! 🙂
After doing a quick google search, it appears you can easily migrate your DHCP server as long as you have both your current DHCP server (running Server 2008 R2) and a new Windows Server 2012 server you are going to designate as a DHCP server.
Login to your new Server 2012 R2 machine with the DHCP role installed
Open up a Powershell shell
Execute the following command to export the configuration from the Server 2008 R2 DHCP Server
Execute the following command to import the configuration into your new Server 2012 R2 DHCP Server; must be an Administrator running this PowerShell command.
In this article, I have documented the steps I took to update our two domain controllers to Server 2012 R2 from Server 2008 R2. While this can be considered a tutorial, it is more a reflection of what I did during my migration process. This guide assumes you have already made backups of your environment, all Windows Active Directory Domain Controllers in the forest are running Server 2003 or later, and we will be recycling (reusing) the same two servers you deployed. Last, Microsoft strongly recommends we do a clean install and not directly upgrade each server, so we will decommission a DC, reinstall windows, and then redeploy the DC until the entire environment has been upgraded.
Prepare the AD Schema for Server 2012 R2
Mount the Server 2012 R2 installation disk on one of your Domain Controllers
Open up a command prompt with Administrative Privileges and navigate to the /support/adprep folder on the installation media.
Click Start, type cmd, right click select Run as administrator
Execute the command: d:
Execute the command: cd d:\support\adprep
Execute the following command (don't close out of this until after we verify the schema version in an upcoming step):
adprep /forestprep
Type the letter C and press the enter key to begin the process
Execute the following command:
adprep /domainprep
Verify the schema version has been updated
Click Start and search for regedit
Open up regedit and navigate to Computer\HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\NTDS\Parameters
Verify the Schema Version value matches the last entry shown in your upgrade results. In my case, the Schema Version should be 69.
Demote and decommission secondary domain controller
Click Start, Run...
Type dcpromo and click OK
Click Next > on the Welcome page
If the domain controller has the global catalog service, make sure your primary DC also has the service enabled and click OK. This can be done by opening up Active Directory Sites and Services and viewing the services for each domain controller.
Make sure the Delete this domain because this server is the last domain controller in the domain is UNCHECKED, and click Next >
Type in a new password to be used for the Local Administrator account the machine will contain after it is demoted.
Click Next > on the Summary page
Check the Reboot on completion box to restart the server after the service has been removed
Log back into the DC upon reboot and open up Server Manager
In Roles Summary, click Remove Roles
Click Next > on the Before You Begin page
UncheckActive Directory Domain Services and DNS Server (if the role is installed) and click Next >
Click Remove
Click Close
Select Yes on the Do you want to restart now? dialog box
Log back into the DC upon reboot and you should greeted by a Removal Results window. Let the process finish and select Close upon removal success.
Disjoin the machine from the domain
Click Start, right click Computer,select Properties
Click Change settings
Click Change... on the System Properties page
Check Workgroup, type in a workgroup name, and click OK
Click OK on the warning dialog
Click OK on the Welcome to the workgroup dialog
Click OK on the restart dialog
Click Close on the System Properties window
(oops, forgot to make a screenshot!)
Click Restart Later on the Microsoft Windows dialog box
Shutdown the machine
Format the decommissioned machine, reinstall a clean copy of Server 2012 R2, and join the machine to the domain.
Add first Server 2012 R2 Domain Controller
At this point, you should have one Server 2008 R2 Domain Controller and a blank Server 2012 R2 machine joined to the domain ready for the Active Directory services. If you are at this point, continue on, if not, you might want to read back a couple steps and see where things ventured off course.
Start Server Manager on your new Server 2012 R2 machine.
Select Manage in the top right and select Add Roles and Features
Click Next > on the Before you begin screen
Click Next > on the Select installation type screen
Ensure your new server is selected and click Next >
Check the box next to Active Directory Domain Services
On the Add features that are required for Active Directory Domain Services? dialog, click the Add Features button
Click Next >
Click Next >
Check the box that says Restart the destination server automatically if required (Click Yes on the restart dialog if it pops up)
Click the Install button
Once the install is done, click the Close button
Next, head back to the Server Manager screen and select the warning icon with the flag; then select Promote this server to a domain controller.
On the Deployment Configuration page, make sure Add a domain controller to an existing domain is checked and hit Next >
Check Domain Name System (DNS) server, Check Global Catalog (GC), and uncheck Read only domain controller (RODC). Enter a strong password to be used to access Directory Services Restore Mode and click Next >
Click Next > on the DNS Options page
Click Next > on the Additional Options page, or if you would like, you can manually select a domain controller to replicate data from and then hit Next >.
Click Next > on the Paths page
Click Next > on the Review Options page
Click Install on the Prerequisites Check page
Once the domain controller reboots after installation, open up Server Manager and select Tools, Active Directory Users and Computers
Expand your Domain and select Domain Controllers; ensure your new machine shows up here.
Next, verify DNS works properly
Go back to Server Manager, select Tools, DNS
Expand your server, Forward Lookup Zones, and right click on your domain name and select Properties
Select the Name Servers tab and ensure all DCs are listed
Next, we need to verify the FSMO (Flexible Single Master Operations) roles are stored on our other server 2008 DC
On the new Server 2012 R2 DC we joined, open up a command prompt with administrative privileges.
Execute the following command to verify FSMO roles are on our 2008 DC: netdom query fsmo
Next, we need to transfer the FSMO roles from our primary DC to our new one
Execute the following command using the same command prompt in the previous steps: ntdsutil
Type roles when prompted and hit enter
Type connections when prompted and hit enter
Type connect to server server2012DC.mydomain.com, where server2012DC is the new DC we just deployed, when prompted and hit enter
Type quit and hit enter
Type transfer schema master and hit enter
Click Yes on the Role Transfer Dialog for the Schema Master role
Type transfer naming master and hit enter
Click Yes on the Role Transfer Confirmation Dialog for the Naming Master role
Type transfer PDC and hit enter
Click Yes on the Role Transfer Configuration Dialog for the Primary Domain Controller role
Type transfer RID master and hit enter
Click Yes on the Role Transfer Configuration Dialog for the RID master role
Type transfer infrastructure master and hit enter
Click Yes on the Role Transfer Configuration Dialog for the Infrastructure Master role
Type quit and hit enter
Type quit and hit enter
Execute the following command to ensure the FSMO services are on the new Server 2012 R2 machine: netdom query fsmo
At this point, you should have a Server 2012 R2 DC with the FSMO roles and a secondary 2008 R2 Domain Controller. If not, please go back and complete the steps to get to this point.
Next, decommission the last Server 2008 R2 domain controller that used to function as the primary DC.
Follow the same instructions in Step 2 above called Demote and decommission secondary domain controller
Next, add the machine back to the domain
Follow the same instructions in Step 3 above called Add first Server 2012 R2 Domain Controller
At this point, your environment should be up and running with Windows Server 2012 R2! You can optionally transfer the FSMO roles back to your "primary" DC that you had before, or continue on with the roles left on the current DC.
Symptom: You receive the following error when trying to place a Lync call to someone.
Call was not completed or has ended.
When contacting your support team, reference error ID 52063 (source ID 242).
Troubleshooting information is available online, including best practices for using Lync.
Solution: This turned out to be an issue where the call was unable to be completed due to the following issues.
The Lync client was unresponsive/could not answer an audio call
The Lync user was not configured for the call to be transferred to voicemail
Please make sure that the Lync client can successfully answer calls or that the user has voicemail configured in the event the Lync client cannot answer a call.
Today I was curious how many numbers we have used up on our DID block and wanted to pull a report specifying which numbers were allocated to which user, conference room, etc. After a quick Google search, I came accross a powershell script by Lasse Nordvik Wedø. Attached below is a copy of his powershell script with a few modifications by me to pull a couple of extra attributes about the user from Active Directory. Please make sure to drop him a comment on his blog, located here: http://tech.rundtomrundt.com/2012/04/listing-all-deployed-numbers-in-lync.html
The following list of numbers will be generated to a .htm web report:
Users enabled in Lync without a number assigned
Users with a number assigned to them
Users with a private line
Analog devices
Common Area Phone Numbers
Response Group Numbers
Meeting (dialin) numbers
Meeting Room Objects
Exchange Objects
Application endpoints with a LineURI
The script can be downloaded here (make sure to remove the .txt extension once you have downloaded it): Assigned_numbers.ps1
Here is an image of executing the powershell script:
Here is an image of the result (webpage):
Here is an image of what the htm file looks like when you open it up:
Symptom: After changing the samAccountName (User Principal Name (UPN)) of a user in your on-premise Active Directory environment, run the DirSync tool to update the user on Office 365 (or wait 3 hours) [and have verified the user's new UPN synchronized in the Office 365 admin portal], the user is presented with the following error when trying to sign into Outlook, SharePoint, CRM, etc. on Office 365.
Sorry, but we're having trouble signing you in Please try again in a few minutes. If this doesn't work, you might want to contact your admin and report the following error: 80041034.
Solution: This turns out to be an issue with ADFS (Active Directory Federated Services), caching user account attributes, which prevents a successful login. Here are a couple of solutions to solve this issue:
Try reupdating/repairing party trust with Office 365.
Login to one of your ADFS servers.
Click Start, All Programs, Windows Azure Active Directory, and then select Windows Azure Active Directory Module for Windows PowerShell.
Execute the following command to connect to Microsoft's online services (when prompted, type in your Office 365 Administrator credentials)
Connect-MSOLService
Execute the following command to update federated trust
Try temporarily disabling Local Security Authority (LSA) credential caching on your AD FS servers (note this can increase the load on your ADFS and AD DS servers)
Login to each of your ADFS servers and complete the following steps
Click Start -> Run -> regedit to open up the registry editor
Note: This guide is deprecated. AD RMS is now supersceeded by Azure Information Protection. If you have previously used this guide, review the following guide on Migrating from AD RMS to Azure Information Protection.
Those that have the following tiers of Office 365 are entitled to use Microsoft's AD Rights Management Service to help secure their documents:
SharePoint Online Enterprise (E1),
SharePoint Online Enterprise (E3 & E4),
SharePoint Online Midsized Business
Here is a list of compiled questions I wanted to know when trying AD RMS for Office 365.
What is AD Rights Management Services?
Active Directory Rights Management Services (AD RMS) is an information protection technology that works with AD RMS-enabled applications to help safeguard digital information from unauthorized use. Content owners can define who can open, modify, print, forward, or take other actions with the information. http://technet.microsoft.com/en-us/library/cc771234(v=ws.10).aspx
Are their any examples of using AD Rights Management Services?
Office 365 did a pretty good job covering the concept of using AD RMS as well as how to use AD RMS. You can find the full tutorial here, however their official YouTube video covering this has been embedded below:
How do I deploy or enable AD Rights Management Services for Office 365?
By default, in a pure Office 365 environment, we can get 3 RMS Templates in Windows Azure Rights Management. If we have an on-premises server running Active Directory Rights Management Services (AD RMS), we can get more via import a trusted publishing domain (TPD). So, without on premise server, we just can get default 3 Templates.
I enabled AD RMS for Office 365, but I don't see any options in Office 2010. How do I get Office 2010 to use AD RMS?
Since you are more than likely on the E4 tier, I would highly recommend downloading Office 2013 from your Office 365 portal and installing that. Office 2013 from the Office 365 portal comes preconfigured to work more fluidly with AD RMS. However, if you need to use Office 2010, you can complete the following steps as documented on the following technet article: http://technet.microsoft.com/en-us/library/jj585031.aspx#sectionSection1
Can people outside my organization open protected documents with AD RMS (not apart of my domain)?
Short answer, Yes. Long answer, they are required to create a Microsoft account using their email address (Gmail, AOL, Yahoo, etc) to authenticate themselves. Below are some screenshots of the registration process; I have copied them from the following technet article for archival purposes: http://blogs.technet.com/b/rms/archive/2013/08/29/the-new-microsoft-rms-is-live-in-preview.aspx
How can an Office 365 customer purchase Microsoft Rights Management Services (RMS)?
Active Directory RMS is already included in the Office 365 Enterprise E3, and E4 plans and the Education A3 and A4 plans. RMS is also available as an add-on in the E1 and A2 plans. Consumption of rights-protected content is free. A license is required to protect content.
Symptom: When browsing through the event viewer logs on your Windows Update Services server, you notice the following Event IDs with a Level of Errorin the following order: 12052, 12042, 12022, 12032, 12012, 12002, 13042.
Log Name: Application Source: Windows Server Update Services Event ID: 12052 Task Category: 9 Level: Error Description: The DSS Authentication Web Service is not working.
Log Name: Application Source: Windows Server Update Services Date: 10/3/2013 4:53:26 AM Event ID: 12042 Task Category: 9 Level: Error Description: The SimpleAuth Web Service is not working.
Log Name: Application Source: Windows Server Update Services Date: 10/3/2013 4:53:26 AM Event ID: 12022 Task Category: 9 Level: Error Description: The Client Web Service is not working.
Log Name: Application Source: Windows Server Update Services Date: 10/3/2013 4:53:26 AM Event ID: 12032 Task Category: 9 Level: Error Description: The Server Synchronization Web Service is not working.
Log Name: Application Source: Windows Server Update Services Date: 10/3/2013 4:53:26 AM Event ID: 12012 Task Category: 9 Level: Error Description: The API Remoting Web Service is not working.
Log Name: Application Source: Windows Server Update Services Date: 10/3/2013 4:53:26 AM Event ID: 12002 Task Category: 9 Level: Error Description: The Reporting Web Service is not working.
Log Name: Application Source: Windows Server Update Services Date: 10/3/2013 4:53:26 AM Event ID: 13042 Task Category: 6 Level: Error Description: Self-update is not working.
Additionally, you can recreate these events by running the following command: wsusutil.exe checkhealth
Solution: Reconfigure the WSUS server via the wsusutil.exe command.
Login to the WSUS server
Open up a command prompt with Administrative rights
Navigate to the Update Services\Tools directory.
By default you can find it on your C drive by executing the following command
cd "c:\Program Files\Update Services\Tools"
Execute one of the following commands
If updates are configured for port 80 execute this command
wsusutil.exe usecustomwebsite false
If updates are configured for port 8530 execute this command
wsusutil.exe usecustomwebsite true
Execute the following command to verify the WSUS service is running correctly
wsusutil.exe checkhealth
You should see Event ID 10000 in event viewer confirming all is well
Since Microsoft announced they would be retiring their PIC (Public IM Connectivity) service, the ability to federate with AOL will soon cease to exist. Interestingly though, AOL has made a public statement saying they will now support direct federation with Lync customers.
AOL is pleased to offer Microsoft Lync customers the opportunity to continue their current federation with AIM and establish new federations if needed. For the first time, we are enabling companies with the ability to establish a direct relationship with AOL to provision and manage their connectivity to the AIM network. This will also allow you to have direct and immediate access to AIM technical support engineers who can quickly identify and resolve any AIM-related issues, thus making the transition to AOL is seamless with no disruption to your company and users.